Most cybersecurity products allowed the data to be transmitted because it was being sent by a reputable program (CCleaner). Fortunately, Hacker Deterrent Pro users were 100% protected from this malicious connection to the hacker’s server.

Hacker Deterrent Pro only allows software to talk to its maker. For example, Microsoft Word is only allowed to talk to its maker — Microsoft Corporation. The same goes for CCleaner. Since 216.126.225.148 isn’t the maker of CCleaner, Hacker Deterrent Pro users know to keep it blocked. Therefore, not a single bit of sensitive info is sent to the hacker’s server.

The CCleaner hack highlights why everyone needs the unique security found only in Hacker Deterrent Pro. The patented and patent-pending methods are often the only way to fully protect yourself when hackers use good programs to do bad things.

The US Govt installed a “very carelessly implemented” backdoor into Yahoo email servers. (The Intercept)

According to a recent Pew Research survey, most Americans (69%) don’t trust their government to be able to keep their personal information safe and secure. The concern of the majority has already come to pass:

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers). C2 Centers are the very heart of the hacker’s operation. Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center. Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.